Article Details

Original Article Text

Click to Toggle View

Ivanti warns of critical vTM auth bypass with public exploit. ​Today, Ivanti urged customers to patch a critical authentication bypass vulnerability impacting Virtual Traffic Manager (vTM) appliances that can let attackers create rogue administrator accounts. Ivanti vTM is a software-based application delivery controller (ADC) that provides app-centric traffic management and load balancing for hosting business-critical services. Tracked as CVE-2024-7593, this auth bypass vulnerability is due to an incorrect implementation of an authentication algorithm that allows remote unauthenticated attackers to bypass authentication on Internet-exposed vTM admin panels. "Ivanti released updates for Ivanti Virtual Traffic Manager (vTM) which addressed a critical vulnerability. Successful exploitation could lead to authentication bypass and creation of an administrator user," the company warned on Tuesday. "We are not aware of any customers being exploited by this vulnerability at the time of disclosure. However, a Proof of Concept is publicly available, and we urge customers to upgrade to the latest patched version. " Ivanti advises admins to restrict access to the vTM management interface by binding it to an internal network or private IP address to reduce the attack surface and block potential exploitation attempts. To limit admin access to the management interface through the private/corporate network, admins have to: The security flaw has been fixed in Ivanti vTM 22.2R1 and 22.7R2, with patches to be released for the remaining supported versions over the coming weeks. Ivanti says it has no evidence that the CVE-2024-7593 auth bypass has been exploited in attacks but advised admins to check the Audit Logs Output for new 'user1' or 'user2' admin users added via the GUI or using the publicly available exploit code. Today, Ivanti also warned admins to immediately patch an information disclosure vulnerability (CVE-2024-7569) in Ivanti ITSM on-prem and Neurons for ITSM versions 2023.4 and earlier. This vulnerability can let unauthenticated attackers obtain the OIDC client secret via debug information. The company patched another authentication bypass flaw (CVE-2024-22024) impacting Ivanti Connect Secure, Policy Secure, and ZTA gateways in February when it urged admins to secure vulnerable appliances immediately. Ivanti VPN appliances have been under attack since December 2023 using exploits chaining the CVE-2023-46805 authentication bypass and the CVE-2024-21887 command injection flaws as zero days. The company also warned of a third zero-day (a server-side request forgery bug tracked as CVE-2024-21893) under mass exploitation in February, allowing threat actors to bypass authentication on unpatched ICS, IPS, and ZTA gateways.

Daily Brief Summary

CYBERCRIME // Ivanti Issues Urgent Patch for Critical vTM Vulnerability

Ivanti announced a critical authentication bypass vulnerability in Virtual Traffic Manager (vTM) appliances, allowing the creation of rogue administrator accounts.

The flaw, identified as CVE-2024-7593, arose from incorrect implementation of an authentication algorithm enabling remote attackers to bypass authentication mechanisms on vTM admin panels.

While no exploits of this vulnerability have been reported among customers, a Proof of Concept is available publicly, increasing the risk of exploitation.

To mitigate risks, Ivanti has released updates for affected Virtual Traffic Manager versions and recommends restricting access to the vTM management interface to internal networks.

Patched versions include Ivanti vTM 22.2R1 and 22.7R2, with further updates scheduled for other supported versions in the following weeks.

Ivanti also reported vulnerabilities in other products, including an information disclosure issue in Ivanti ITSM and an authentication bypass in Ivanti Connect Secure, among other products.

The company further advised administrators to perform regular audits to detect any unauthorized administrator accounts created through the exploit.